VID |
22568 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its self-reported version number, the instance of Apache Tomcat 7.0 listening on the remote host is earlier than Tomcat 7.0.32 and, therefore, may be affected by a security bypass vulnerability.
An error exists in the file 'filters/CsrfPreventionFilter.java' that can allow cross-site request forgery (CSRF) attacks to bypass the filtering. This can allow access to protected resources without a session identifier.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.32 http://seclists.org/fulldisclosure/2012/Dec/74
* Platforms Affected: Apache Tomcat Server versions prior to 7.0.32 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.32 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2012-4431 (CVE) |
Related URL |
56814 (SecurityFocus) |
Related URL |
(ISS) |
|